Software Requirements Prioritization: Risk Analysis

Software Requirements Prioritization: Risk Analysis

University of Colorado System

About this course: Risk Analysis, Assessment, and Prioritization looks at how you can manage conflicts at system levels, but it can also be applied to lower level assessments. How do you manage and document conflict, along with alternatives? In analyzing alternatives, you must consider risks. In this course, we'll look into how to analyze risk, evaluate risk, document risks, and use this information for prioritization of requirements. Qualitative and Quantitative approaches will be covered.

Who is this class for: This is a graduate level class and can prove useful to those just entering the software engineering process, as well as those who have years of experience. Coding is not needed. Software engineers, managers, security engineers, technical writers, testers, and many more can learn much from these lessons in gaining a better understanding of how software requirements tie to your jobs. You will also gain extended views compared to the software processes your companies currently use.
This specialization is a beginning course into Software Requirements and introduces fundamental software engineering comparisons, applied to the roles of the requirements analyst. Here we especially discuss analysis and prioritization of requirements with stakeholder assistance toward determining what should be included in your document of full requirements.
This is also a course in the Engineering Secure Software Requirements Certificate, which can be used as a professional certificate or as a start toward further graduate studies in Computer Science or Software Engineering.
It is recommended any learner of this course to have a good understanding or working knowledge of requirement elicitation as a prerequisite.

Once requirements have been somewhat/mostly determined, we next need to go carefully through our work. This involves analyzing risk, assessing alternative plans, and prioritizing. In this module, we examine how to begin documenting conflicts and generating conflict resolution.

Risk goes far beyond security. Most non-functional requirements are part of risk analysis. In this lesson, we discuss different types of risks, how they can be identified, and how to visualize a causal linking of failures, causes, and consequences using risk trees and cut-set trees.

In writing use cases and scenarios, we'll discover risk in the interactions. Interactions may happen out of order, to quickly or slowly, or not occur at all. In risk assessment, we assess the likelihood of risks and their severity, the likelihood of consequences, and thus, attempt to control high-priority risks.

Many approaches can be used to incorporate risk management into your software requirements engineering process. One is Defect Detection Prevention (DDP). We can also analyze alternatives qualitatively and quantitatively. We discuss Defect Detection Prevention, Value Cost Prioritization, and the Analytic Hierarchal Process in this module and how these techniques can be scaled for every day use.

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

Help from Your Peers

Connect with thousands of other learners and debate ideas, discuss course material,
and get help mastering concepts.

Certificates

Earn official recognition for your work, and share your success with friends,
colleagues, and employers.

Creators

University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.